-
181
Towards secure and resilient unmanned aerial vehicles swarm network based on blockchain
Published 2024-12-01“…Additionally, routing learning based on node security attributes and link quality ensures secure and efficient data transmission. …”
Get full text
Article -
182
Application of Ontology Matching Algorithm Based on Linguistic Features in English Pronunciation Quality Evaluation
Published 2022-01-01“…According to the features of nodes in ontology tree, methods to calculate the external features and internal features of nodes are proposed, respectively. …”
Get full text
Article -
183
Distributed computations for large-scale networked systems using belief propagation
Published 2023-05-01“…This paper introduces several related distributed algorithms, generalised from the celebrated belief propagation algorithm for statistical learning. These algorithms are suitable for a class of computational problems in large-scale networked systems, ranging from average consensus, sensor fusion, distributed estimation, distributed optimisation, distributed control, and distributed learning. …”
Get full text
Article -
184
Modeling the violation of reward maximization and invariance in reinforcement schedules.
Published 2008-08-01“…Within this framework, Reinforcement Learning can approach contextual learning with the mixture of empirical findings and principled assumptions that seem to coexist in the best descriptions of animal behavior. …”
Get full text
Article -
185
I-MPN: inductive message passing network for efficient human-in-the-loop annotation of mobile eye tracking data
Published 2025-04-01“…While mobile eye-tracking systems combining egocentric video and gaze signals can offer valuable insights, manual analysis of these recordings is time-intensive. In this work, we present a novel human-centered learning algorithm designed for automated object recognition within mobile eye-tracking settings. …”
Get full text
Article -
186
-
187
“Q-Feed”—An Effective Solution for the Free-Riding Problem in Unstructured P2P Networks
Published 2010-01-01“…This paper presents a solution for reducing the ill effects of free-riders in decentralised unstructured P2P networks. …”
Get full text
Article -
188
Three-Dimensional Mobility Management of Unmanned Aerial Vehicles in Flying Ad-Hoc Networks
Published 2024-01-01“…In this research, the proposed technique specifically addresses the challenges related to mobility management, rapid mobility, and communication issues arising from high mobility in nodes within FANETs. We present a novel approach where flying nodes are modelled using semi-Markov decision problems (SMDPs) based on state transitions and actions which are then solved using the Reinforcement Learning (RL) approach for reliable and effective communication in FANETs. …”
Get full text
Article -
189
Controllability robustness of complex networks
Published 2022-12-01“…This article presents an overview on the state-of-the-art development in complex network controllability and its robustness against malicious attacks and random failures. …”
Get full text
Article -
190
Localization algorithm for large-scale wireless sensor networks based on FCMTSR-support vector machine
Published 2016-10-01“…Sensor node localization is one of research hotspots in the applications of wireless sensor network field. …”
Get full text
Article -
191
-
192
Construction and Application Analysis of an Intelligent Distribution Network Identification System Based on Deep Neural Networks
Published 2024-11-01“… INTRODUCTION: At present, the communication between measuring data and network topology in the distribution system cannot be accurately established. …”
Get full text
Article -
193
Crime Busting Model Based on Dynamic Ranking Algorithms
Published 2013-01-01“…Our method can also greatly increase the accuracy of solution with the enhancement of semantic learning filtering at the same time. Moreover, another dynamic algorithm of node contraction is also presented to help identify the leader among conspirators. …”
Get full text
Article -
194
Empire and the megamachine: comparing two controversies over social media content
Published 2019-03-01Get full text
Article -
195
Smart agriculture resource allocation and energy optimization using bidirectional long short-term memory with ant colony optimization (Bi-LSTM–ACO)
Published 2025-06-01“…Nevertheless, increased node density, constrained energy supplies, and unstable environmental circumstances present barriers to resource allocation and communication efficiency.MethodsTo address these limitations, a hybrid system combining deep learning and metaheuristic optimization was developed, integrating Bidirectional Long Short-Term Memory (Bi-LSTM) with Ant Colony Optimization (ACO). …”
Get full text
Article -
196
Semantic ECG hash similarity graph
Published 2025-07-01“…Additionally, the adjacency matrix is highly susceptible to noise interference, leading to unreliable node connections. In this paper, we present a novel graph generation learning framework that incorporates semantic hash coding to capture the intricate associations both within and between ECG signals, thereby significantly enhancing the retrieval efficiency of subsequent graph-based deep learning models. …”
Get full text
Article -
197
Research on Resource Reservation Strategy for Edge Federation
Published 2025-01-01“…It proposes a load prediction-based resource reservation strategy and optimizes this strategy according to the load levels present in the edge federation. Subsequently, we introduce a multi-agent deep deterministic policy gradient (RRP-MADDPG) approach based on a multi-agent deep reinforcement learning algorithm aimed at reducing average task delay. …”
Get full text
Article -
198
Efficient optimisation of physical reservoir computers using only a delayed input
Published 2025-01-01“…Abstract Reservoir computing is a machine learning algorithm for processing time dependent data which is well suited for experimental implementation. …”
Get full text
Article -
199
An Unmanned Delivery Vehicle Path-Planning Method Based on Point-Graph Joint Embedding and Dual Decoders
Published 2025-03-01“…In addition, the model is trained offline using a deep reinforcement-learning strategy in combination with pseudo-label learning. …”
Get full text
Article -
200
Distributed Abnormal Activity Detection in Smart Environments
Published 2014-05-01“…Firstly, DetectingAct finds the normal activity patterns through duration-dependent frequent pattern mining algorithm (DFPMA), which adopts unsupervised learning instead of supervised learning. Secondly, the distributed knowledge storage mechanism (DKSM) is introduced to store the mined patterns in each node. …”
Get full text
Article